Download - 1 Lars Putteneers Sales Engineer Synchronized Security Revolutionizing Advanced Threat Protection
1
Lars PutteneersSales Engineer
Synchronized SecurityRevolutionizing Advanced Threat Protection
2
What we’re going to cover
• What’s the problem?• It’s time for a security revolution• How it works• Synchronized Security 2015-2016• Your path to synchronized Security
33
What’s the problem?
4
Threat Landscape
5
Increasing attacks, increasing sophistication
Attack surface exponentially larger
Laptops/DesktopsPhones/Tablets
Virtual servers/desktopsCloud servers/storage
Threats more sophisticated
Attacks are more coordinated than defenses
6
Security industry 2D view
77
It’s time for a security revolution
8
Generations of security
Point Products
Anti-virus
IPS
Firewall
Sandbox
Layers
Bundles
Suites
UTM
EMM
Synchronized Security
Security Heartbeat™
9
Comprehensive protection • Prevent Malware• Detect Compromises• Remediate Threats• Investigate Issues • Encrypt Data
MAC
ANDROID
WINDOWS
iOS
CORPORATEDATA
WINDOWSPHONE
LINUX
Synchronized Security
10
Integration at a different levelSynchronized Security Alternative
• System-level intelligence• Automated correlation• Faster decision-making• Accelerated Threat Discovery• Automated Incident Response• Simple unified management
• Resource intensive• Manual correlation• Dependent upon human analysis• Manual Threat/Incident response• Extra products• Endpoint/Network unaware of
each other
Management
Enduser Network
SIEM
Endpoint Mgmt NW Mgmt
Endpoint Network
11
Synchronized Security
Security must be comprehensiveThe capabilities required to fully satisfy customer need
Security can be made simplePlatform, deployment, licensing, user experience
Security is more effective as a systemNew possibilities through technology cooperation
Synchronized SecurityIntegrated, context-aware security where Enduser and Network technology share meaningful information to deliver better protection.
SOPHOS LABS
Sophos Cloud
Next Gen Network Security
Next Gen Enduser Security
heartbeat
1212
How it works
13
3 pillars of advanced threat protection
By device identification reduces time taken to manually identify infected or at risk device or host
by IP address alone
Compromised endpoints are isolated by the firewall
automatically, while the endpoint terminates and
removes malicious software.
Endpoint and network protection combine to identify unknown threats faster. Sophos Security Heartbeat™ pulses real-time information on suspicious
behaviors
Security Heartbeat™
Accelerated Threat Discovery
Active Source Identification
Automated Incident Response
Faster, better decisions Quicker, easier investigation Reduced threat impact
14
System Initialization
RegistrationNGEP & NGFW register with Sophos Cloud which sends certificate/sec info to both
ConnectionEndpoints initiate connection to the trusted Firewall
ValidationFirewall and Endpoints check sec info sent to them by Cloud to verify they are valid
SOPHOS LABS
Sophos Cloud
Next Gen Network Security
Next Gen Enduser Security
heartbeat
Support of multiple locationsEndpoints can establish connection to Firewalls at any customer’s location as the Sophos Cloud registry can be shared among all Galileo-enabled Firewalls
15
Accelerated Threat Discovery
Security HeartbeatA few bytes of information are shared every 15 seconds from Endpoint to Network
EventsUpon discovery, security information like Malware, PUA is shared between Endpoints and Network
HealthEndpoint sends Red, Yellow, Green health status to Network
SOPHOS LABS
Sophos Cloud
Next Gen Network Security
Next Gen Enduser Security
heartbeat
VPN supportGalileo supports endpoints connected within the local network as well as those connected via VPN as long as they are connecting to the Firewall.
16
Active Source Identification
Security HeartbeatPositively identifying the machine. Associating the IP address with a particular Endpoint
Advanced AttackIf Network Firewall detects an advanced attack but can’t determine source, it requests details from endpoints
Source IdentificationEndpoint sends details of machine name, user, process, and IP address
SOPHOS LABS
Sophos Cloud
Next Gen Network Security
Next Gen Enduser Security
heartbeat
17
Automated Incident Response
GreenEndpoints have full access to internal applications and data as well as internet
YellowAffected endpoints can be isolated from internal/sensitive applications and data while maintaining access to internet
RedAffected endpoints are isolated from the network and have no access to internal systems or external internet
SOPHOS LABS
Sophos Cloud
Next Gen Network Security
Next Gen Enduser Security
heartbeat
Defaults and customizationThere are no default policies based on health status so admins can customize responses as needed. We are developing a best practices guide to assist customers in recommended policy setup.
1818
Synchronized Security 2015
19
Comprehensive Next-Gen Endpoint
SOPHOS SYSTEMPROTECTOR
ApplicationTracking
Threat Engine
Application Control Reputation
EmulatorHIPS/
Runtime Protection
DeviceControl
MaliciousTraffic
Detection
Web Protection
IoCCollector
Live Protection
Security Heartbeat™
20
Comprehensive Next-Gen Network
SOPHOS FIREWALLOPERATING SYSTEM
Web Filtering
IntrusionPrevention
SystemRouting
EmailSecurit
y
SecurityHeartbeat
SelectiveSandbox
ApplicationControl
Data LossPrevention
ATPDetectionProxy
ThreatEngine
Firewall
21
SOPHOS SYSTEMPROTECTOR
Sophos Cloud
Next Generation Threat Detection
heartbeat
SOPHOS FIREWALLOPERATING SYSTEM
ApplicationTracking
Threat Engine
Application Control Reputation
EmulatorHIPS/
Runtime Protection
DeviceControl
MaliciousTraffic
Detection
Web Protection
IoCCollector
Live Protection
SecurityHeartbeat™
Web Filtering
IntrusionPrevention
SystemRouting Email
Security
SecurityHeartbeat™
SelectiveSandbox
ApplicationControl
Data LossPrevention
ATPDetectionProxy
ThreatEngine
Isolate subnet and WAN accessBlock/remove malwareIdentify & clean other infected systems
User | System | File
Compromise
Firewall
2222
Synchronized Security 2016
23
SOPHOS SYSTEMPROTECTOR
Sophos Cloud
Improved Threat Detection
heartbeat
SOPHOS FIREWALLOPERATING SYSTEM
ApplicationTracking
Threat Engine
Application Control Reputation
EmulatorHIPS/
Runtime Protection
DeviceControl
MaliciousTraffic
Detection
Web Protection
IoCCollector
Live Protection
SecurityHeartbeat™
Web Filtering
IntrusionPrevention
SystemRouting Email
Security
SecurityHeartbeat™
SelectiveSandbox
ApplicationControl
Data LossPrevention
ATPDetectionProxy
ThreatEngine
Lockdown local network accessRemove file encryption keysTerminate/remove malwareIdentify & clean other infected systems
User | System | File
Compromise
Firewall
24
SOPHOS SYSTEMPROTECTOR
Sophos Cloud
Automated Protection of Endpoints
heartbeat
SOPHOS FIREWALLOPERATING SYSTEM
ApplicationTracking
Threat Engine
Application Control Reputation
EmulatorHIPS/
Runtime Protection
DeviceControl
MaliciousTraffic
Detection
Web Protection
IoCCollector
Live Protection
SecurityHeartbeat™
Web Filtering
IntrusionPrevention
SystemRouting Email
Security
SecurityHeartbeat™
SelectiveSandbox
ApplicationControl
Data LossPrevention
ATPDetectionProxy
ThreatEngine
Discover unmanaged EndpointsCould it be managed?Self-service portal setupUser authenticationDistribute security profile
Win | Mac | Mobile
Endpoint
Firewall
25
SOPHOS SYSTEMPROTECTOR
Sophos Cloud
Detect and Remediate Compromises
heartbeat
SOPHOS FIREWALLOPERATING SYSTEM
ApplicationTracking
Threat Engine
Application Control Reputation
EmulatorHIPS/
Runtime Protection
DeviceControl
MaliciousTraffic
Detection
Web Protection
IoCCollector
Live Protection
SecurityHeartbeat™
Web Filtering
IntrusionPrevention
SystemRouting Email
Security
SecurityHeartbeat™
SelectiveSandbox
ApplicationControl
Data LossPrevention
ATPDetectionProxy
ThreatEngine
Identify compromiseDetect sourceAssess impactBlock/remove malwareIdentify & clean other infected systems
User | System | File
Compromise
Firewall
2626
Your path to Synchronized Security
27
NEXT-GENENDUSER SECURITY
NEXT-GENNETWORK SECURITY
SOPHOS UTM
• NETWORK PROTECTIONMODULE
SOPHOS CLOUD ENDPOINT
• CLOUD ENDUSER PROTECTION
• CLOUD ENDPOINT ADVANCED
Endpoint and Network working together
• FULLGUARD LICENSE
• TOTALPROTECT BUNDLE
NEXT-GEN FIREWALL
• NETWORK PROTECTIONMODULE
• NEXT-GENGUARD LICENSE
• NEXT-GENPROTECT BUNDLE
28
Already using Sophos
* Cloud Endpoint requires Sophos Cloud Endpoint Protection Advanced or Sophos Cloud Enduser Protection subscriptions
3030
Conclusion
31
The Synchronized Security differenceSophos Competition
Synchronized Security Point Products
Simple Complex
Comprehensive Incomplete
Prevention, Detection, Investigation, Remediation, Encryption Prevention
Enduser, Network, Server, Mobile, Web, Email, Encryption Endpoint or Network
Automated Manual
Block the known, unknown, advanced, coordinated attacks Partial Prevention
32
Revolutionizing advanced threat protection
Synchronized Security
Accelerated Threat Discovery
Positive Source Identification
Automated Incident Response
Faster, better decisions Quicker, easier investigation
Reduced threat impact
33© Sophos Ltd. All rights reserved.